US 20100023572 A1 Abstract A cryptographically secure, computer hardware-implemented binary finite-field polynomial modular reduction method estimates and randomizes a polynomial quotient used for computation of a polynomial remainder. The randomizing error injected into the approximate polynomial quotient is limited to a few bits, e.g. less than half a word. The computed polynomial remainder is congruent with but a small random multiple of the residue, which can be found by a final strict binary field reduction by the modulus. In addition to a computational unit and operations sequencer, the computing hardware also includes a random or pseudo-random number generator for producing the random polynomial error. The modular reduction method thus resists hardware cryptoanalysis attacks, such as timing and power analysis attacks.
Claims(11) 1. A cryptographically secure, computer hardware-implemented modular polynomial reduction method in the binary finite field GF (2^{n}), comprising:
precomputing and storing in memory a polynomial constant u(x) representing a bit-scaled reciprocal of a polynomial modulus m(x); estimating an approximate polynomial quotient q for a polynomial p(x) to be reduced modulo m(x), wherein said estimating is executed upon p(x) in a computation unit by a polynomial multiplication over GF (2 ^{n}) said constant u(x) and by bits shifts;generating in a random number generator a random polynomial error value E(x) and applying said polynomial error value to said approximate polynomial quotient to obtain a randomized polynomial quotient q′(x)=q(x)+E(x); and calculating a polynomial remainder r′(x)=p(x)+q′(x)·m(x) in said computation unit, said remainder r′(x) being of high degree than said modulus m(x) but congruent to p(x) modulo m(x) and where the degree of p(x) is less than or equal to 2k+1. 2. The method of ^{2k+w}/m(x).3. The method of ^{k−1})·u(x))/x^{k+2}.4. The method of ^{2k+w}/m(x) and the quotient is estimated as q(x)=((p(x)/x^{k−w})·u(x))/x^{k+2w}, where w is the word size in bits, and where the degree of p(x) is less than or equal to 2k+w.5. The method of 6. The method of 7. Computational hardware for executing a cryptographically secure polynomial modular reduction method over a binary finite field GF (2^{n}), the hardware comprising:
a computation unit adapted to perform word-wide finite-field multiply and accumulate steps on polynomial operands retrieved from a memory and polynomial coefficient intermediate results from a set of working registers; a random number generator for generating a random polynomial error value E(x); an operations sequencer comprising logic circuitry for controlling the computation unit and random number generator in accord with program instructions so as to carry out a polynomial modular reduction of a number p(x) with respect to a modulus m(x) over a binary finite field GF (2 ^{n}) that involves at least an estimation of a polynomial quotient q(x) from a pre-stored polynomial constant u(x) representing a bit-scaled reciprocal of the modulus, a randomization of said the approximate polynomial quotient with said random polynomial error value E(x) to obtain a randomized polynomial quotient q′(x)=q(x)+E(x), and a calculation of a polynomial remainder value r′(x)=p(x)+q′(x)·m(x).8. The computation hardware of 9. The computation hardware of ^{2k+w}/m(x), with w being the word size of the computation unit in bits.10. The computation hardware of q′(x)=((p(x)·x ^{k−w})·u(x))/x ^{k+2w}.11. The computation hardware of Description The invention relates to arithmetic processing and calculating systems and computer-implemented methods, especially for use in cryptography applications. The invention relates in particular to residue arithmetic involving modular reduction of polynomials in a finite field GF(2 Numerous cryptographic algorithms make use of large-integer multiplication (or exponentiation) and reduction of the product to a residue value that is congruent for a specified modulus that is related to the cryptographic key. Some cryptographic algorithms, including the AES/Rijndael block cipher and also those based on discrete logarithms and elliptic curves, perform arithmetic operations on polynomials in a finite field, such as the binary field GF(2 At the same time, it is important that these computations be fast and accurate. Multiplication and reduction, whether operated upon large integers or upon polynomials in a finite field, is usually the most computationally intensive portion of a cryptographic algorithm. Several distinct computational techniques have been developed for efficient modular reduction, including those known as the Quisquater method, the Barrett method and the Montgomery method, along with modifications involving pre-computation and table look-up. These well-known techniques are described and compared in the prior art. See, for example: (1) A. Bosselaers et al., “Comparison of three modular reduction functions”, Advances in Cryptology/Crypto '93, LNCS 773, Springer-Verlag, 1994, pp. 175-186. (2) Jean Frangois Dhem, “Design of an efficient public-key cryptographic library for RISC-based smart cards”, doctoral dissertation, Universite catholique de Louvain, Louvain-la-Neuve, Belgium, May 1998. (3) C. H. Lim et al., “Fast Modular Reduction With Precomputation”, preprint, 1999 (available from CiteSeer Scientific Literature Digital Library, citeseer.nj.nec.com/109504.html). (4) Hollmann et al., “Method and Device for Executing a Decrypting Mechanism through Calculating a Standardized Modular Exponentiation for Thwarting Timing Attacks”, U.S. Pat. No. 6,366,673 B1, Apr. 2, 2002 (based on application filed Sep. 15, 1998). An objective of the present invention is to provide an improvement of the Barrett modular reduction method and corresponding computing apparatus, especially as applied to polynomials, which is more secure against cryptoanalysis attacks, while still providing fast and accurate results. Another objective of the present invention is to provide the aforementioned improved method and apparatus which speeds up quotient estimation for use in the modular reduction of polynomials. These objects are met by a computer-implemented method for modular reduction of polynomials in a binary finite field GF(2 The hardware used to execute the method steps of the invention includes a random number generator to inject random error into the quotient estimation. A computation unit with memory access operates under the control of an operation sequencer executing firmware to carry out the word-wide multiply-accumulate steps of multi-word polynomial multiplication and modular reduction. The computation unit may include multiply-accumulate hardware dedicated to finite field polynomial operations, or may be selectable to perform either natural or polynomial arithmetic. With reference to As so far described, the apparatus is substantially similar to other available hardware adapted for multi-word polynomial arithmetic operations. Polynomial arithmetic carried out in the binary finite field GF(2 Unlike prior hardware of this type, the hardware in With reference to Modular arithmetic with polynomials is similar in some respects to modular arithmetic with integers, although extending this to polynomials over a binary finite field GF(2 (Note: when comparing the relative sizes of polynomial, the comparison is performed degree by degree, starting with the polynomial coefficients for the largest degree in x.) Addition and subtraction of polynomials in a field are carried out in the usual manner of adding or subtracting the coefficients for each degree separately,
However, for any binary field, the members are {0,1}, so that addition and subtraction of the field elements is performed modulo 2 (0±0=0, 0±1=1±0=1, 1±1=0). Note that, in this case, subtraction is identical to addition. In computer hardware, addition/subtraction modulo 2 is performed with a logical XOR operation upon the array of the bits. For example, (x
where the coefficient c
(Again, in a binary field, the summation is performed modulo 2.) However, in a finite field, this definition must be modified in order to ensure that the product also belongs to the field. In particular, ordinary polynomial multiplication is followed by modular reduction by a modulus m(x) of degree n (where n is the dimension of the finite field, as in GF(2 Let F[x] be the set of polynomials all of whose coefficients are members of a field F. If the modulus m(x) is a polynomial of degree d in F[x], then for polynomials p (x), r (x) E F [x], we say that p (x) is congruent to r(x) modulo m(x), written as p(x)=r(x) (mod m(x)), if and only if m(x) divides the polynomial p(x)−r(x); in other words p(x)−r(x) is a polynomial multiple of m(x), that is, p(x)−r(x)=q(x)·m(x) for some polynomial q(x)εF [x]. Equivalently, p(x) and r(x) have the same remainder upon division by m(x). Modular reduction of a polynomial p(x), which could be an ordinary product of polynomials a(x) and b(x) in F[x], i.e. p(x)=a(x)·b(x), involves finding a polynomial quotient q(x) such that the remainder or residue r(x) is a polynomial of degree less than m(x), i.e., deg(r(x))<d. The polynomial residue r(x), which is congruent with p(x), is the polynomial value we ultimately want. In the binary finite field GF(2 Barrett's method, originally devised for integer reduction operations, involves pre-calculating and storing a scaled estimate of the modulus' reciprocal, U, and replacing the long division with multiplications and word or bit shifts (dividing by x) in order to estimate the quotient. With appropriate choice of parameters, the error in the quotient estimate is at most two. The present invention adapts Barrett's method to modular reduction of polynomial in a binary finite field and also improves upon Barrett's method with a faster estimation of the quotient and by intentionally injecting a random error into the quotient prior to computing the remainder. The resulting randomized remainder will be slightly larger than (in terms of polynomial degree), but congruent with, the residue value. Let k be the size of the polynomial modulus m(x) in degree, where and let p(x) be the polynomial to be reduced, up to a degree , where p _{j} ·x ^{j}, with
We begin by precomputing and storing (step This stored value is then subsequently used in all polynomial reduction operations for this particular modulus m(x). u(x) is always of degree k for every modulus m(x) that is not a simple power of x. To perform a modulo reduction of p(x), we estimate a polynomial quotient q(x) (step For a modulus m(x) of high degree (multi-word), the operation can be performed with word shifts rather than bit shifts. With a word size w, we can define u(x)=x At this stage (step For a modulus m(x) of high degree (multi-word), the error should be limited to a few bits, e.g., less than half a word, i.e., deg(E(x))<w/2. This limits the potential error contributed by the random generator to a specified number of bits, e.g. half a word, in addition to any error arising from the quotient estimation itself. Next, we compute (step Because a random polynomial error E is introduced into the polynomial quotient q(x), the calculated remainder r′(x) will be slightly larger in degree than the modulus m(x). The remainder r′(x) can be used in further calculations, the result of which if necessary may again be reduced. (The error remains bounded.) Alternatively, depending upon the needs of the particular application, the residue r(x) can be calculated from the remainder r′(x) by applying ordinary GF(2 Randomizing the modular reduction provides security against various cryptoanalytic attacks that rely upon consistency in power usage to determine the modulus. Here, the binary field polynomial reduction of p(x) modulo m(x) varies randomly from one execution to the next, while still producing an intermediate remainder r′(x) that is congruent. The sequence of binary field polynomial reduction at the end to generate a final residue value r(x) also varies randomly from one execution to the next because it operates upon different remainders r′(x). The polynomial p(x) to be reduced in this way can be obtained from a variety of different arithmetic operations, including multiplication, squaring, exponentiation, addition, etc. Likewise, the modulus m(x) to be used can be derived in a variety of ways, most usually in cryptography from a key. The randomized modular reduction method of the present invention is useful in many cryptographic algorithms that rely upon such binary field GF(2 Referenced by
Classifications
Legal Events
Rotate |